Sciweavers

2362 search results - page 435 / 473
» The wireless network jamming problem
Sort
View
INFOCOM
2009
IEEE
15 years 8 months ago
An Experimental Evaluation of Rate Adaptation for Multi-Antenna Systems
—Increasingly wireless networks use multi-antenna nodes as in IEEE 802.11n and 802.16. The Physical layer (PHY) in such systems may use the antennas to provide multiple streams o...
Wonsoo Kim, O. Khan, Kien T. Truong, Soon-Hyeok Ch...
WOWMOM
2005
ACM
109views Multimedia» more  WOWMOM 2005»
15 years 7 months ago
On Maximizing Lifetime of a Sensor Cluster
We consider the energy consumed in radio transmission of a set of sensors forming a data gathering wireless network. Our objective is to enhance the lifetime of such networks by e...
Samar Agnihotri, Pavan Nuggehalli, H. S. Jamadagni
SERSCISA
2009
Springer
15 years 8 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
MOBICOM
2004
ACM
15 years 7 months ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
ICIP
2004
IEEE
16 years 3 months ago
Joint server/peer receiver-driven rate-distortion optimized video streaming using asynchronous clocks
This paper proposes a joint server/peer video streaming architecture for wireless networks, where a receiver can access a video server via an access point using the infrastructure...
Danjue Li, Gene Cheung, Chen-Nee Chuah, S. J. Ben ...